3,191 research outputs found
Experimentally implementable criteria revealing substructures of genuine multipartite entanglement
We present a general framework that reveals substructures of genuine
multipartite entanglement. Via simple inequalities it is possible to
discriminate different sets of multipartite qubit states. These inequalities
are beneficial regarding experimental examinations as only local measurements
are required. Furthermore, the number of observables scales favorably with
system size. In exemplary cases we demonstrate the noise resistance and discuss
implementations.Comment: 14 pages, 4 figure
Molecular mechanisms of neuroinvasion by monocytes-macrophages in HIV-1 infection
HIV associated neurocognitive disorders and their histopathological correlates largely depend on the continuous seeding of the central nervous system with immune activated leukocytes, mainly monocytes/macrophages from the periphery. The blood-brain-barrier plays a critical role in this never stopping neuroinvasion, although it appears unaltered until the late stage of HIV encephalitis. HIV flux that moves toward the brain thus relies on hijacking and exacerbating the physiological mechanisms that govern blood brain barrier crossing rather than barrier disruption. This review will summarize the recent data describing neuroinvasion by HIV with a focus on the molecular mechanisms involved
Experimentally Feasible Security Check for n-qubit Quantum Secret Sharing
In this article we present a general security strategy for quantum secret
sharing (QSS) protocols based on the HBB scheme presented by Hillery, Bu\v{z}ek
and Berthiaume [Phys. Rev A \textbf{59}, 1829 (1999)]. We focus on a
generalization of the HBB protocol to communication parties thus including
-partite GHZ states. We show that the multipartite version of the HBB scheme
is insecure in certain settings and impractical when going to large . To
provide security for such QSS schemes in general we use the framework presented
by some of the authors [M. Huber, F. Minert, A. Gabriel, B. C. Hiesmayr, Phys.
Rev. Lett. \textbf{104}, 210501 (2010)] to detect certain genuine partite
entanglement between the communication parties. In particular, we present a
simple inequality which tests the security.Comment: 5 pages, submitted to Phys. Rev.
Purification of genuine multipartite entanglement
In tasks, where multipartite entanglement plays a central role, state
purification is, due to inevitable noise, a crucial part of the procedure. We
consider a scenario exploiting the multipartite entanglement in a
straightforward multipartite purification algorithm and compare it to bipartite
purification procedures combined with state teleportation. While complete
purification requires an infinite amount of input states in both cases, we show
that for an imperfect output fidelity the multipartite procedure exhibits a
major advantage in terms of input states used.Comment: 5 pages, 2 figure
- …